GOVERNMENT > National


« Back to News

2022-12-15

Congress Wants To Ban TikTok

Anti-Social Act: "TikTok collects data on tens of millions of American every day... We know it’s used to manipulate feeds and influence elections"

2022-12-15

A New US National Cyber Strategy

Holistic: The US National Cyber Director has a new unified cyber strategy designed to dramatically transform America's cyber security position.

2022-12-05

Ericsson Invests In 6G Network Research

Merge The Digital & Physical World: Network equipment maker Ericsson will be investing heavily into 6G mobile connectivity research in Britain.

2022-11-30

Sharing Deepfakes To Be Made Illegal In Britain

The proposed new law will allow prosecution for recording and sharing intimate images without the need to prove an intention to cause distress.

2022-11-29

It’s Well Past 230 For The US Communications Decency Act

US Legislation introduced 26 years ago that was designed to protect & promote growth of the Internet is well past its 'Sell By' date. By Ronald Marks.

2022-11-07

Australia’s Government Hit By Another Cyber Attack

Stolen Data: A supply chain attack that struck technology services providers to government departments is the latest in a sustained campaign.

2022-11-08

Does Elon Musk Owning Twitter Increase Cyber Security Risks?

US legislators want an inquiry to investigate national security concerns raised by Saudi Arabia’s role in Musk's $44 billion takeover of Twitter.

2022-11-17

Britain Has Secretly Contributed £6m To Ukraine’s Cyber Defence

British spy agencies have been playing a key role in defending Ukraine from widespread Russian cyber attacks since the start of the invasion.

2023-01-13

A Snapshot Of Cyber Security In Britain

Britain 2021 - 2022: The numbers show a huge & growing range of activity - and the UK cyber security industry generated £10 billion in revenues.

2022-11-01

Cyber Security Threats For The US Midterm Elections

Election officials have been alerted to protect their voting systems and be vigilant about political violence in a "very complex threat environment."

2022-10-31

British Prime Minister’s Phone Hacked

Agents suspected of working for Russia were responsible for the alleged hacking of Liz Truss's mobile phone while she was Foreign Secretary.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

RedTeam Security

RedTeam Security

RedTeam Security is a provider of Penetration Testing, Social Engineering, Red Teaming and Red Team Training services.

Asigra

Asigra

Asigra provides an industry leading cloud backup and recovery software platform called Asigra Cloud Backup.

SentinelOne

SentinelOne

SentinelOne is a pioneer in delivering autonomous security for the endpoint, datacenter and cloud environments to help organizations secure their assets with speed and simplicity.

HYAS Infosec

HYAS Infosec

HYAS is a highly skilled information security firm developing the next generation of information security technology.

Trustlook

Trustlook

Trustlook's SECUREai engine delivers the performance and scalability needed to provide total threat protection against malware and other forms of attack.

WetStone Technologies

WetStone Technologies

WetStone develops software solutions that support investigators and analysts engaged in eCrime Investigation, eForensics and incident response activities.

Silensec

Silensec

Silensec is a management consulting, technology services and training company specialized in information security.

C2A Security

C2A Security

C2A Security offers a comprehensive suite of cyber security solutions for the automotive industry, providing in-vehicle end-to-end protection.

Danish Maritime Cybersecurity Unit

Danish Maritime Cybersecurity Unit

The Danish Maritime Cybersecurity Unit is tasked with delivering the initiatives set out in the Cyber and Information Security Strategy for the Maritime Sector.

XPO IT Services

XPO IT Services

XPO IT Services are dedicated to providing secure, high quality IT recycling and asset disposal services.

CyberFortress

CyberFortress

CyberFortress is an insuretech startup offering a new kind of online business interruption policy designed for small business.

ERI

ERI

ERI is the largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company in the United States.

Quantinuum

Quantinuum

Quantinuum is the combination of Cambridge Quantum with Honeywell Quantum Solutions, structured to drive the future of quantum computing.

Critical Insight

Critical Insight

Critical Insight provide Managed Detection and Response, Vulnerability Detection, and Cyber Security Consulting Services to help you secure your mission-critical systems.

443ID

443ID

443ID brings OSINT data to Identity Security professionals on any digital platform.

CyberSecureRIA

CyberSecureRIA

We founded CyberSecureRIA specifically to secure and support RIAs. We exist to secure SEC-registered RIAs, and keep them compliant with cybersecurity regulations.